dstack Logo

Open-Source Confidential Computing

Deploy secure applications with hardware-guaranteed privacy using TEE technology. Built for confidential AI, private cloud compute, and secure data processing.

Developer Friendly

Docker support means no code changes required. Package your existing applications and deploy them securely in minutes.

Confidential AI Ready

Purpose-built for confidential AI with TEE GPU support. Run private AI models on NVIDIA GPUs with hardware-guaranteed confidentiality.

Enterprise Security

Open source, independently audited by security experts, with secure services out-of-the-box.

Verifiable Computing

Every application comes with cryptographic attestation and a Trust Center for real-time verification.

Simple Deploy Process

Deploy confidential applications with just a few clicks - no complex setup required

1

Paste Docker Compose

Copy your existing docker-compose.yml file - no modifications needed

Step 1
2

Click Deploy

Select your TEE hardware and deployment options

Step 2
3

Application Launched

Your app runs with hardware-guaranteed confidentiality

Step 3

Trust Center

Complete Transparency. Every deployed application comes with a comprehensive Trust Center for full verification.

Source Code Verification

Review the exact source code running in your TEE environment

Hardware Information

Detailed specs of the TEE hardware running your application

Network Configuration

Complete network topology and security settings

Attestation Report

Cryptographic proof of execution environment integrity

Trust Center Interface

Security Audit Report

Independent security audit by zkSecurity team. Review our comprehensive security analysis and recommendations.

Security Audit Report Cover

zkSecurity Team Audit

Comprehensive security analysis and vulnerability assessment

dstack vs Others

Compare dstack with traditional cloud providers and other confidential computing solutions

dstack

Open-source confidential computing

AWS / GCP / Azure

Cloud providers

Confidential Containers

CNCF project

Others

Alternative solutions

Transparency
Open Source
Proprietary
Open Source
Proprietary
Control
Code Controlled
Vendor Controlled
Developer Controlled
Third-party
Auditability
Audited by zkSecurity
Limited
No audit
None
Performance
<5% Overhead
Varies
Unknown
Unknown
AI Focus
Purpose-built
Generic Cloud
Generic
Limited

Ready for Confidential Computing?

Join the open-source community building the future of secure computing. Get started with confidential AI and private cloud applications.

© 2025 Phala. All rights reserved. PrivacyTerms